You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now we are whitelisting executable paths, that means that if we allow /home/username/myProgram a malware could replace that file to gain connection access. We can prevent this by:
Easy+fast but can be bypassed way: check the last modification date and alert the user.
Use Blake3 hash to check file integrity. (I say Blake3 because it is a cryptographic hash but it is very fast).
And with this, I just thought of something, I propose: what about a new feature to allow executing a certain executable with a hash independently of where it is (path)?? This could "fix" #543 too.
The text was updated successfully, but these errors were encountered:
Right now we are whitelisting executable paths, that means that if we allow /home/username/myProgram a malware could replace that file to gain connection access. We can prevent this by:
Easy+fast but can be bypassed way: check the last modification date and alert the user.
Use Blake3 hash to check file integrity. (I say Blake3 because it is a cryptographic hash but it is very fast).
And with this, I just thought of something, I propose: what about a new feature to allow executing a certain executable with a hash independently of where it is (path)?? This could "fix" #543 too.
The text was updated successfully, but these errors were encountered: